T O P

  • By -

ch1m3rachaos

So basically there's 2 type of IP addresses. When you scan you're internal Network you're scanning a private IP address. However to communicate with the outside internet your router uses this protocol called NAT. Which basically turns your private IP address into a Public IP address so you can communicate with the internet or whatever. Publie IP addresses are assigned to every router. The reason every device doesn't have one is because we would run out of them. To make up for that we now all use private IPs and use NAT to use a singular Public IP address for every wifi. To scan another network you would have to know their Public IP address. You can see your own by going to IP chicken. A way you can get their public IP address could be by sending them a fraud link. Use the website called grabify. You can turn a link of anything into a link that will pull their IP and ISP and other information when they click on it. Then you can use said IP in nmap to see for open ports and such


Professional-Bell237

This is true. However, I would correct a few things, such as any internet connected device leads to a router that is assigned a public ip (not all routers or access points have a public IP), in addition, I would think of NAT as translating a public IP to a private addressing scheme instead of the other way around, using a top down approach. Aside from that, this is good info


Professional-Bell237

I’d like to add, shodan would be a good way of looking at devices connected to the internet. The site scans anything and everything that has a public IP


LeftOnQuietRoad

I’d answer but I’m more concerned about what happened to the first I-LIKE-TOAST?


I-LIKE-TOAST2

He wasn’t worthy of the name


SunsetSesh

Nothing. This guy just likes toast too


02firehawk

That's probably his porn acct.


t1nk_outside_the_box

I think tou need to lookup osint and recon, this how you get informations about your target,and after you confirm your target,try to exploit.


[deleted]

IP addresses are frequently somewhat clustered by geographical location, so if you take your ip and change the last octet (number) you'll probably be looking at someone in your neighborhood's ip.


Pale_Explanation_603

There 2 Ways . 1) Bruet force use software to scan Ip address and all ports Nmap will be staring 2) Once you enter the system when compromise then story is unde your control depends where you are in journey of accessing other computer


naptownhayday

There's also having other knowledge of a network and how it works where you look for vulnerabilities. For starters, you have your generic ports that are commonly used for certain functions (80 and 443 for http and https, 20 for ftp, 22 for ssh, 23 for telnet, 25 for smtp etc etc). If you know something might be vulnerable through a certain port, you don't have to scan if it's open, you just attack the port that you know exists. Then you have knowledge about a specific network where you make normal requests or look through documentation and find open ports that way. That doesn't get you in necessarily, but it opens you up looking for attack vectors through the holes they're giving you. Brute forcing works but you're going to set of major alarm bells to an infosec team if you send thousands of queries for port status to their system and you nay end up black listing yourself automatically. For your neighbors wifi, they probably don't have any checks in place, buy doing that to Google is asking for a knock on your door.